Alyssa Shames
More by Alyssa
Automating Your Containers’ Security Scanning
Vulnerabilities impact containers, but trusted images can help. Learn how Docker’s native Snyk integration helps secure your software supply chain.
Read now
The Impacts of an Insecure Software Supply Chain
Today, software regularly integrates open-source code from third-party sources into applications. While this practice empowers developers to create more capable software in a shorter time frame, it brings with it the risk of introducing inadequately vetted code. How aware are we of the security of our open-source code? Most of us use pip or npm…
Read now
Automating Your Containers’ Security Scanning
Vulnerabilities impact containers, but trusted images can help. Learn how Docker’s native Snyk integration helps secure your software supply chain.
Read now
The Impacts of an Insecure Software Supply Chain
Today, software regularly integrates open-source code from third-party sources into applications. While this practice empowers developers to create more capable software in a shorter time frame, it brings with it the risk of introducing inadequately vetted code. How aware are we of the security of our open-source code? Most of us use pip or npm…
Read now